System and method for secure message reply
First Claim
1. A method for providing a secure response to a first party, the method comprising:
- presenting, by a computer, an application to an unauthenticated user;
receiving, by the computer, an application response by the unauthenticated user including private information of the unauthenticated user but not including identification information of the unauthenticated user;
encrypting, by the computer, the application response including the private information;
receiving, by the computer, the encrypted application response;
generating, by the computer, a response to the application response;
transmitting, by the computer, instructions to the unauthenticated user to access the response;
receiving, by the computer, identification information of the unauthenticated user;
authenticating, by the computer, the unauthenticated user based on the identification information, whereby the unauthenticated user is an authenticated user; and
presenting, by the computer, the response to the application response to the authenticated user.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method whereby an unregistered, anonymous user at an organization'"'"'s website makes a submission/inquiry and is able to access a secure response containing private information without pre-registering or establishing an account with the organization. A response to the user is made via an unsecured e-mail notification that provides the user with an HTTPS link to an authentication page. The user then enters his/her user identification, for example, the user email address and password which was associated with the original submission/inquiry. Once the email address and password is authenticated, the secure response message is displayed on the user'"'"'s web browser in SSL. Each response is provided on a per-submission basis.
152 Citations
21 Claims
-
1. A method for providing a secure response to a first party, the method comprising:
-
presenting, by a computer, an application to an unauthenticated user; receiving, by the computer, an application response by the unauthenticated user including private information of the unauthenticated user but not including identification information of the unauthenticated user; encrypting, by the computer, the application response including the private information; receiving, by the computer, the encrypted application response; generating, by the computer, a response to the application response; transmitting, by the computer, instructions to the unauthenticated user to access the response; receiving, by the computer, identification information of the unauthenticated user; authenticating, by the computer, the unauthenticated user based on the identification information, whereby the unauthenticated user is an authenticated user; and presenting, by the computer, the response to the application response to the authenticated user. - View Dependent Claims (2, 3)
-
-
4. A method for providing a secure response to an unauthenticated applicant, comprising:
-
receiving, by a computer, a first application submission from the unauthenticated applicant and a response thereto by a financial institution, wherein the first application submission is directed to the financial institution and includes an identifier associated with the first application submission, and wherein the unauthenticated applicant is not authenticated or registered with the financial institution when the first application submission is received; storing, by the computer, the response by the financial institution for later retrieval by an unauthenticated first party or the financial institution; sending, by the computer, a notification message to the unauthenticated applicant, wherein the notification message provides information for securely accessing the response; and correlating, by the computer, a second submission from the unauthenticated first party to the identifier provided in the first application submission and permitting the applicant to securely access the response from the financial institution upon authentication of the unauthenticated applicant, wherein the unauthenticated first party cannot access the stored response until the unauthenticated first party is authenticated via the notification to the unauthenticated applicant.
-
-
5. A system for providing a secure response to an unauthenticated first party, comprising:
-
a receiving component, executed by a server, for receiving a first submission from the unauthenticated first party and a response thereto by a second party, wherein the first submission is directed to the second party and includes an identifier associated with the first submission, and wherein the unauthenticated first party is not authenticated or registered with the second party when the first submission is received; a data storage medium for storing the response by the second party for later retrieval by the unauthenticated first party or the second party; a transmitting component, executed by the server, for sending a notification to the unauthenticated first party, wherein the notification provides information for securely accessing the response; and an authentication component, executed by the server, for permitting the unauthenticated first party to securely access the response from the second party upon authentication of the unauthenticated first party, wherein the unauthenticated first party cannot access the stored response until the unauthenticated first party is authenticated via the notification to the unauthenticated first party. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification